cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-30383,https://securityvulnerability.io/vulnerability/CVE-2023-30383,Buffer Overflow Vulnerability in TP-LINK Archer Routers,"Certain TP-LINK Archer routers, specifically the Archer C50v2, Archer C20v1, and Archer C2v1, are susceptible to a buffer overflow vulnerability. When specifically crafted data is parsed, this vulnerability may result in a Denial of Service (DoS) condition, potentially disrupting the operation of the affected devices. Users should ensure their routers are updated to the latest firmware to mitigate the risk.",Tp-link,Archer C2 V1 Firmware,7.5,HIGH,0.0016499999910593033,false,,false,false,true,2023-07-15T08:43:41.000Z,true,false,false,,2023-07-18T00:00:00.000Z,0 CVE-2017-8217,https://securityvulnerability.io/vulnerability/CVE-2017-8217,Iptables Misconfiguration in TP-Link Devices,"TP-Link C2 and C20i devices running specific firmware versions are exposed due to overly permissive iptables rules. This vulnerability allows SNMP access on any network interface, which can lead to unauthorized information disclosure and potential malicious activity. Users are encouraged to review their device settings and apply necessary security measures to mitigate risks.",Tp-link,C2 Firmware,5.3,MEDIUM,0.005419999826699495,false,,false,false,false,,,false,false,,2022-10-03T16:23:06.000Z,0 CVE-2017-8219,https://securityvulnerability.io/vulnerability/CVE-2017-8219,,TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.,Tp-link,C2 Firmware,6.5,MEDIUM,0.0008699999889358878,false,,false,false,false,,,false,false,,2017-04-25T20:59:00.000Z,0 CVE-2017-8220,https://securityvulnerability.io/vulnerability/CVE-2017-8220,,"TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a ""host="" line within HTTP POST data.",Tp-link,C2 Firmware,9.9,CRITICAL,0.002529999939724803,false,,false,false,false,,,false,false,,2017-04-25T20:59:00.000Z,0 CVE-2017-8218,https://securityvulnerability.io/vulnerability/CVE-2017-8218,,"vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password.",Tp-link,C2 Firmware,9.8,CRITICAL,0.006169999949634075,false,,false,false,false,,,false,false,,2017-04-25T20:59:00.000Z,0